• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

530 Other courses in Coventry

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Definitive network forensics for engineers

5.0(3)

By Systems & Network Training

NETWORK FORENSICS TRAINING COURSE DESCRIPTION This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. WHAT WILL YOU LEARN * Recognise network forensic data sources. * Perform network forensics using: Wireshark NetFlow Log analysis * Describe issues such as encryption. NETWORK FORENSICS TRAINING COURSE DETAILS * Who will benefit: Technical network and/or security staff. * Prerequisites: TCP/IP foundation for engineers. * Duration 3 days NETWORK FORENSICS TRAINING COURSE CONTENTS * What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. * Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. * Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. * Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. * Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. * Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. * The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. * Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. * Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.

Definitive network forensics for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497

Object Oriented Analysis & Design

5.0(3)

By Systems & Network Training

OOAD TRAINING COURSE DESCRIPTION A workshop course providing thorough practical knowledge of object oriented analysis and design methods. WHAT WILL YOU LEARN * Perform Systems Analysis with Object Oriented methods. * Identify key classes and objects. * Expand and refine OO problem domain models. * Design Class hierarchies using inheritance and polymorphism. * Design programs with Object Oriented methods. OOAD TRAINING COURSE DETAILS * Who will benefit: System analysts, designers, programmers and project managers. * Prerequisites: It is desirable that delegates have experience of programming in C++/Java or some other OOP language. * Duration 5 days OOAD TRAINING COURSE CONTENTS * What is OO? Classes, objects, messages, encapsulation, associations, inheritance, polymorphism, reusability. * What is Systems Analysis and design? Data flow diagrams, structure diagrams. The OO approach. * OOA The problem domain and object modelling. Identifying classes and objects. Generalisation and inheritance. Defining attributes and methods. * OOD Refining the OOA results. Designing the User Interface. Designing the algorithms and data structures using objects. Designing the methods. * OOP Prototyping. Implementing OOD with OOPs and OOPLs.

Object Oriented Analysis & Design
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4637

Definitive Nagios for engineers

5.0(1)

By Systems & Network Training

DEFINITIVE NAGIOS TRAINING COURSE DESCRIPTION Nagios is an open source application designed to provide system and network monitoring. This hands on course gives a comprehensive coverage of using Nagios to provide monitoring of Linux, Windows and network devices. The course is based on Nagios core but contact us if you would like Nagios XI. WHAT WILL YOU LEARN * Install Nagios. * Configure Nagios. * Monitor Windows, Linux and Cisco (and other network equipment) using Nagios. * Configure notifications DEFINITIVE NAGIOS TRAINING COURSE DETAILS * Who will benefit: Technical staff working with Nagios. * Prerequisites: None. * Duration 2 days DEFINITIVE NAGIOS FOR ENGINEERS * Nagios architecture Downloading Nagios, Installing Nagios, Nagios core, plugins, frontends, addons. Nagios XI. Nagios Fusion. Hands on Installing Nagios. * Getting started with Nagios Nagios files, nagios.cfg, minimal.cfg. Starting and stopping Nagios. Hands on Controlling Nagios. * Using Nagios Nagios web interface. Maps, Hosts, host groups, services, service groups, problems. Reports. Configuration. Hands on Using the web interface. * Monitoring Linux systems SSH, NRPE. Hands on Monitoring Linux system health. * Monitoring Windows systems Installing NSClient++, Configuring NSClient++, check_nt plugin, monitoring uptime, CPU, memory, disks, services, processes. Hands on Monitoring Windows system health. * Monitoring network devices SNMP architecture, MIBs. Polling. Hands on Configuring Nagios for SNMP. * Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Monitoring network devices. * Nagios alerts and notifications SNMP traps. Email notifications, SMS alerts other messaging

Definitive Nagios for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

Peripheral Intravenous Cannulation (Peripheral vascular access device)

By Guardian Angels Training

Gain the knowledge and skills to safely insert and manage peripheral IV cannulas with our training course for healthcare professionals. Ideal for nurses, medical personnel, and other practitioners.

Peripheral Intravenous Cannulation (Peripheral vascular access device)
Delivered in-person, on-requestDelivered In-Person in Internationally
£1475

Financial Analysis for Decision Makers

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- Financial Analysis and Decision Making specifies a financial outline to support the life cycle approach of managing tedious projects over a long time scale. This course includes the advanced level of accounting structures which are required to insert knowledgable information in order to make decisions or to support the decision-making process where accounting and financial information overlaps other decision-making processes. In order to manage the growth of the organisation and measure the profitability it is very important to do a financial analysis. This course will take you through different models of accounting and finance which is helpful for the decision-making process thereby helping ensure sustainable growth and success.

Financial Analysis for Decision Makers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3626

Principles and Practices of Cyber Security

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- Cyber Security plays an important role in every business as it encompasses everything that relates to protecting sensitive data, personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries. This course is designed to understand and gain practical skills to plan, deliver and monitor IT/cyber security to internal and external clients understanding a complete, knowledge in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking including understanding the basics of Kali Operating System and its tools and techniques. It will also cover WiFi security, Website security, human factors, cyber forensics, and cyber security team management, including all other areas in relation to Cyber Security.

Principles and Practices of Cyber Security
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3626

XML primer

5.0(3)

By Systems & Network Training

XML PRIMER TRAINING COURSE DESCRIPTION This course has been designed for web and intranet developers who want to accelerate their learning of XML and its applications without the grind of book learning. Although a basic knowledge of HTML and JavaScript is assumed, it is also assumed you know very little about XML and how to use it. On completion of this course you should understand the benefits of using XML and be able to design XML solutions where applicable to your company's Internet/intranet requirements. The course will be particularly beneficial if you want to know how to communicate data to diverse applications over the Internet or company intranet. WHAT WILL YOU LEARN * Write XML. * Debug XML. * Examine existing code and determine its function. XML PRIMER TRAINING COURSE DETAILS * Who will benefit: Anyone working with XML. * Prerequisites: HTML5 development fundamentals * Duration 3 days XML PRIMER TRAINING COURSE CONTENTS * The origins of XML Markup languages, SGML, document type definitions and validity, introducing XML, IE and XML, accessing content and adding style. * Basic XML XML document structure, elements and attributes, grammar, well formed documents, other XML elements and references. * Document Type Definition (DTDs) Creating a DTD, basic declaration, declaring elements, content definitions, entities, entity declarations, notations, defining attributes, attribute types, forcing inclusion or exclusion of DTD sections, validation. * Namespaces Declaring namespaces, scoping, removing and changing namespaces, qualified names, attribute namespaces. * An introduction to schemas Constructing schemas, defining the root element and its contents,<ELEMENTTYPE>, defining root element contents, adding attributes definitions, <ATTRIBUTETYPE>, <ELEMENT>, <ATTRIBUTE>. * XML & the Document Object Model (DOM) What the DOM offers, DOM and W3C. * Basic DOM concepts XML documents as trees, terminology of tree elements. Key DOM Objects: The document object and its creation, base objects, IE specifics, the XML node hierarchy. * Programming DOM Viewing a DOM model as XML, getting the root element of a document, iterating nodes of a DOM, basic node properties, collection objects, searching for specific values, filtering a nodelist by tagname, more filtering methods, selecting nodes from their attributes. * Amending Content and Structure Creating/saving a DOM as XML, changing content/structure, dynamically building a DOM. * Using ASP and other techniques ASP techniques, HTTPREQUEST object, XSL, transforming and formatting XML. Formatting Using CSS. CSS And XML. * XSL Transformations - XSLT Introduction, the XSL root element, applying XSL stylesheets to XML, XSL elements and operations, instructions - creating text nodes and applying templates, a 'drill-down' approach, simple output formatting, pattern filters - patterns based on position, the Match and Select attributes and their patterns, formatting output, creating new XML in output.

XML primer
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497

Electronic Document Management System (EDMS)

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- EDMS Electronic Document  Management System is basically a kind of IT-based system which is developed to manage the creation, tracking, storage and disposal of all physical and digital documents and records. Through this, we can easily keep track of various documents modified by different users. With the access of one application, many different tasks can be completed that revolve around document management. It enhances the security system where we can easily define whom to have access to what part of the documents. EDRMS is known by many other different names like Enterprise content management systems or digital asset management, document mapping and so on. This course shows participants how to deal with documents in an electronic way to get rid of the paper's hard copy which takes a lot of space and time. It will also update you with the EDRMS system and changes that happen to take place with the passage of time. The advanced technology leads to Advance EDRMS systems with enhanced features. 

Electronic Document Management System (EDMS)
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3626

Accounting for Grants and Projects

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- Understanding the grants coming in and their monitoring, spending and many other factors are directly proportionate to effecting Grant Accounting and Grant Management. Many different funding entities give grants to so many companies, the government sector, and private sectors with the aim to encourage growth and employment and economic viability.  It is important to recognise the government grants in the profit and loss account, so at the end, it can match the costs to which they relate. Considering these grants efficiently in the accounts is very important, as many entities (including the grant-making body) may closely monitor the accounts; and any errors will reflect badly on the accountant. Many development projects are funded through grants from donors. Therefore, it becomes the responsibility of the project management team to safeguard that the limited resources are used efficiently to achieve maximum impact.  This course is planned to train the participants with best practices and essential skills in effective grants management.

Accounting for Grants and Projects
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3626

Electronic Document and Record Management System (EDRMS)

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- EDRMS Electronic Document and Record Management System is basically a kind of IT-based system which is developed to manage the creation, tracking, storage and disposal of all physical and digital documents and records. Through this, we can easily keep track of various documents modified by different users. With the access of one application, many different tasks can be completed that revolve around document management. It enhances the security system where we can easily define whom to have access to what part of the documents. EDRMS is known by many other different names like Enterprise content management systems or digital asset management, document mapping and so on. This course shows participants how to deal with documents in an electronic way to get rid of the paper's hard copy which takes a lot of space and time. It will also update you with the EDRMS system and changes that happen to take place with the passage of time. The advanced technology leads to Advance EDRMS systems with enhanced features. 

Electronic Document and Record Management System (EDRMS)
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3626